David Pointcheval

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Efficient universally-verifiable electronic voting with everlasting privacy
 
2025-01-10Paper
Attribute-based signatures with advanced delegation, and tracing
 
2024-11-12Paper
Verifiable decentralized multi-client functional encryption for inner product
 
2024-09-13Paper
Covercrypt: an efficient early-abort KEM for hidden access policies with traceability from the DDH and LWE
 
2024-06-05Paper
Decentralized Evaluation of Quadratic Polynomials on Encrypted Data
 
2024-03-14Paper
Tracing a linear subspace: application to linearly-homomorphic group signatures
Lecture Notes in Computer Science
2023-11-24Paper
GeT a CAKE: \underline{Ge}neric \underline{T}ransformations from \underline{K}ey encaspulation mechanisms to password \underline{A}uthenticated \underline{K}ey \underline{E}xchanges
 
2023-11-10Paper
Optimal security notion for decentralized multi-client functional encryption
 
2023-11-10Paper
Multi-client functional encryption with fine-grained access control
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
MyOPE: malicious security for oblivious polynomial evaluation
Lecture Notes in Computer Science
2023-07-25Paper
Traceable constant-size multi-authority credentials
Lecture Notes in Computer Science
2023-07-25Paper
Key-policy ABE with switchable attributes
Lecture Notes in Computer Science
2023-07-25Paper
Traceable constant-size multi-authority credentials
Information and Computation
2023-07-17Paper
Asymmetric Cryptography
 
2023-03-29Paper
Multi-client inner-product functional encryption in the random-oracle model
 
2022-12-16Paper
Dynamic decentralized functional encryption
 
2022-11-09Paper
Homomorphic-policy attribute-based key encapsulation mechanisms
Lecture Notes in Computer Science
2022-11-02Paper
Robust password-protected secret sharing
 
2022-08-19Paper
Boosting verifiable computation on encrypted data
 
2021-12-01Paper
Linearly-homomorphic signatures and scalable mix-nets
 
2021-12-01Paper
Traceable inner product functional encryption
 
2020-08-05Paper
Divisible e-cash from constrained pseudo-random functions
 
2020-05-20Paper
Unbounded inner-product functional encryption with succinct keys
 
2020-01-30Paper
Reassessing security of randomizable signatures
 
2020-01-21Paper
On the tightness of forward-secure signature reductions
Journal of Cryptology
2019-01-29Paper
Decentralized multi-client functional encryption for inner product
 
2019-01-23Paper
On the leakage of corrupted garbled circuits
 
2018-11-07Paper
Privacy-preserving plaintext-equality of low-entropy inputs
 
2018-08-10Paper
Fuzzy password-authenticated key exchange
 
2018-07-17Paper
A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption
Theoretical Computer Science
2018-04-04Paper
Cut down the tree to achieve constant complexity in divisible e-cash
Lecture Notes in Computer Science
2017-06-13Paper
Removing erasures with explainable hash proof systems
Lecture Notes in Computer Science
2017-06-13Paper
Encryption switching protocols
Advances in Cryptology – CRYPTO 2016
2016-11-30Paper
The whole is less than the sum of its parts: constructing more efficient lattice-based AKEs
Lecture Notes in Computer Science
2016-10-21Paper
Legally Fair Contract Signing Without Keystones
Applied Cryptography and Network Security
2016-10-04Paper
Short randomizable signatures
Topics in Cryptology - CT-RSA 2016
2016-04-08Paper
Robust pseudo-random number generators with input secure against side-channel attacks
Applied Cryptography and Network Security
2016-03-10Paper
Scalable Divisible E-cash
Applied Cryptography and Network Security
2016-03-10Paper
Practical multi-candidate election system
Proceedings of the twentieth annual ACM symposium on Principles of distributed computing
2016-03-04Paper
Implicit zero-knowledge arguments and applications to the malicious setting
Lecture Notes in Computer Science
2015-12-10Paper
Disjunctions for Hash Proof Systems: New Constructions and Applications
Advances in Cryptology - EUROCRYPT 2015
2015-09-30Paper
Public-key encryption indistinguishable under plaintext-checkable attacks
Lecture Notes in Computer Science
2015-08-27Paper
Divisible e-cash made practical
Lecture Notes in Computer Science
2015-08-27Paper
Simple functional encryption schemes for inner products
Lecture Notes in Computer Science
2015-08-27Paper
Forward secure non-interactive key exchange
Lecture Notes in Computer Science
2014-10-14Paper
Dynamic fully anonymous short group signatures
Progress in Cryptology - VIETCRYPT 2006
2014-08-21Paper
Security proofs for signature schemes
Advances in Cryptology — EUROCRYPT ’96
2014-08-20Paper
Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting
Public-Key Cryptography – PKC 2014
2014-03-25Paper
Analysis and improvement of Lindell's UC-secure commitment schemes
Applied Cryptography and Network Security
2014-01-24Paper
SPHF-friendly non-interactive commitments
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Black-box Trace\&Revoke codes
Algorithmica
2013-11-11Paper
New techniques for SPHFs and efficient one-round PAKE protocols
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Tighter Reductions for Forward-Secure Signature Schemes
Public-Key Cryptography – PKC 2013
2013-04-19Paper
Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages
Public-Key Cryptography – PKC 2013
2013-04-19Paper
Decentralized dynamic broadcast encryption
Lecture Notes in Computer Science
2012-09-25Paper
Compact Round-Optimal Partially-Blind Signatures
Lecture Notes in Computer Science
2012-09-25Paper
Message-based traitor tracing with optimal ciphertext rate
Progress in Cryptology – LATINCRYPT 2012
2012-09-21Paper
Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts
Information Security and Privacy
2012-09-07Paper
Password-based authenticated key exchange
Public Key Cryptography – PKC 2012
2012-07-20Paper
Round-optimal privacy-preserving protocols with smooth projective hash functions
Theory of Cryptography
2012-06-15Paper
Traceable Signature with Stepping Capabilities
Cryptography and Security: From Theory to Applications
2012-06-08Paper
Autotomic signatures
Cryptography and Security: From Theory to Applications
2012-06-08Paper
Security notions for broadcast encryption
Applied Cryptography and Network Security
2011-06-28Paper
Parallel signcryption
Practical Signcryption
2011-05-18Paper
Signatures on randomizable ciphertexts
Public Key Cryptography – PKC 2011
2011-03-15Paper
Contributory password-authenticated group key exchange with join capability
Topics in Cryptology – CT-RSA 2011
2011-02-11Paper
Mediated traceable anonymous encryption
Lecture Notes in Computer Science
2010-08-31Paper
On some incompatible properties of voting schemes
Towards Trustworthy Elections
2010-06-17Paper
Strong cryptography from weak secrets. Building efficient PKE and IBE from distributed passwords
Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
2010-05-04Paper
Flexible group key exchange with on-demand computation of subgroup keys
Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
2010-05-04Paper
A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications
Lecture Notes in Computer Science
2010-01-05Paper
Chosen-ciphertext security without redundancy
Lecture Notes in Computer Science
2010-01-05Paper
Smooth Projective Hashing for Conditionally Extractable Commitments
Advances in Cryptology - CRYPTO 2009
2009-10-20Paper
Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of Signatures
Pairing-Based Cryptography – Pairing 2009
2009-08-18Paper
Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness
Progress in Cryptology – AFRICACRYPT 2009
2009-07-07Paper
New Anonymity Notions for Identity-Based Encryption
Formal to Practical Security
2009-06-09Paper
Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures
Formal to Practical Security
2009-06-09Paper
Public Key Cryptography – PKC 2004
Lecture Notes in Computer Science
2009-05-14Paper
Optimal Randomness Extraction from a Diffie-Hellman Element
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
Distributed Public-Key Cryptography from Weak Secrets
Public Key Cryptography – PKC 2009
2009-03-24Paper
An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication
Information Security and Privacy
2009-03-06Paper
Dynamic Threshold Public-Key Encryption
Lecture Notes in Computer Science
2009-02-10Paper
About the Security of MTI/C0 and MQV
Lecture Notes in Computer Science
2008-11-27Paper
A New Key Exchange Protocol Based on MQV Assuming Public Computations
Lecture Notes in Computer Science
2008-11-27Paper
New Anonymity Notions for Identity-Based Encryption
Lecture Notes in Computer Science
2008-11-20Paper
Anonymous Proxy Signatures
Lecture Notes in Computer Science
2008-11-20Paper
Public Traceability in Traitor Tracing Schemes
Lecture Notes in Computer Science
2008-05-06Paper
Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework
Topics in Cryptology – CT-RSA 2008
2008-04-24Paper
A Scalable Password-Based Group Key Exchange Protocol in the Standard Model
Advances in Cryptology – ASIACRYPT 2006
2008-04-24Paper
Extended Private Information Retrieval and Its Application in Biometrics Authentications
Cryptology and Network Security
2008-04-15Paper
A Simple Threshold Authenticated Key Exchange from Short Secrets
Lecture Notes in Computer Science
2008-03-18Paper
Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys
Pairing-Based Cryptography – Pairing 2007
2007-11-29Paper
Advances in Cryptology - CRYPTO 2003
Lecture Notes in Computer Science
2007-11-28Paper
Optimal Asymmetric Encryption and Signature Paddings
Applied Cryptography and Network Security
2007-09-24Paper
Hardness of Distinguishing the MSB or LSB of Secret Keys in Diffie-Hellman Schemes
Automata, Languages and Programming
2007-09-11Paper
Automated Security Proofs with Sequences of Games
Lecture Notes in Computer Science
2007-09-04Paper
Trapdoor hard-to-invert group isomorphisms and their application to password-based authentication
Journal of Cryptology
2007-05-24Paper
Public Key Cryptography - PKC 2006
Lecture Notes in Computer Science
2007-05-02Paper
Public Key Cryptography - PKC 2006
Lecture Notes in Computer Science
2007-05-02Paper
Public Key Cryptography - PKC 2006
Lecture Notes in Computer Science
2007-05-02Paper
Security in Communication Networks
Lecture Notes in Computer Science
2006-10-10Paper
Selected Areas in Cryptography
Lecture Notes in Computer Science
2006-10-10Paper
Provable security for public key schemes
 
2006-09-25Paper
Authenticated key exchange secure against dictionary attacks
 
2006-03-01Paper
Financial Cryptography and Data Security
Lecture Notes in Computer Science
2005-12-22Paper
Topics in Cryptology – CT-RSA 2005
Lecture Notes in Computer Science
2005-12-08Paper
Public Key Cryptography - PKC 2005
Lecture Notes in Computer Science
2005-12-07Paper
Public Key Cryptography - PKC 2005
Lecture Notes in Computer Science
2005-12-07Paper
Contemporary cryptology.
Advanced Courses in Mathematics -- CRM Barcelona
2005-08-30Paper
Advances in Cryptology – CRYPTO 2004
Lecture Notes in Computer Science
2005-08-23Paper
Cryptographic Hardware and Embedded Systems - CHES 2004
Lecture Notes in Computer Science
2005-08-23Paper
OAEP 3-Round:A Generic and Secure Asymmetric Encryption Padding
 
2005-08-12Paper
RSA-OAEP is secure under the RSA assumption
Journal of Cryptology
2004-09-27Paper
scientific article; zbMATH DE number 2088323 (Why is no real title available?)
 
2004-08-12Paper
scientific article; zbMATH DE number 2088330 (Why is no real title available?)
 
2004-08-12Paper
scientific article; zbMATH DE number 2088331 (Why is no real title available?)
 
2004-08-12Paper
scientific article; zbMATH DE number 2086715 (Why is no real title available?)
 
2004-08-11Paper
scientific article; zbMATH DE number 2085419 (Why is no real title available?)
 
2004-08-09Paper
scientific article; zbMATH DE number 2081087 (Why is no real title available?)
 
2004-08-04Paper
scientific article; zbMATH DE number 2081072 (Why is no real title available?)
 
2004-08-04Paper
scientific article; zbMATH DE number 2081075 (Why is no real title available?)
 
2004-08-04Paper
scientific article; zbMATH DE number 2079933 (Why is no real title available?)
 
2004-08-03Paper
scientific article; zbMATH DE number 2043337 (Why is no real title available?)
 
2004-02-16Paper
The one-more-RSA-inversion problems and the security of Chaum's blind signature scheme
Journal of Cryptology
2003-08-27Paper
scientific article; zbMATH DE number 1951620 (Why is no real title available?)
 
2003-07-21Paper
Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks
Lecture Notes in Computer Science
2003-07-16Paper
scientific article; zbMATH DE number 1942415 (Why is no real title available?)
 
2003-06-30Paper
scientific article; zbMATH DE number 1942422 (Why is no real title available?)
 
2003-06-30Paper
A new NP-complete problem and public-key identification
Designs, Codes and Cryptography
2003-04-03Paper
scientific article; zbMATH DE number 1786488 (Why is no real title available?)
 
2003-03-31Paper
scientific article; zbMATH DE number 1759331 (Why is no real title available?)
 
2003-03-07Paper
scientific article; zbMATH DE number 1842496 (Why is no real title available?)
 
2002-12-08Paper
scientific article; zbMATH DE number 1759639 (Why is no real title available?)
 
2002-11-24Paper
scientific article; zbMATH DE number 1617922 (Why is no real title available?)
 
2002-09-19Paper
scientific article; zbMATH DE number 1617925 (Why is no real title available?)
 
2002-09-01Paper
scientific article; zbMATH DE number 1759358 (Why is no real title available?)
 
2002-06-25Paper
scientific article; zbMATH DE number 1618043 (Why is no real title available?)
 
2002-05-05Paper
scientific article; zbMATH DE number 1504547 (Why is no real title available?)
 
2002-01-27Paper
scientific article; zbMATH DE number 1670847 (Why is no real title available?)
 
2001-12-09Paper
scientific article; zbMATH DE number 1676653 (Why is no real title available?)
 
2001-11-25Paper
scientific article; zbMATH DE number 1440053 (Why is no real title available?)
 
2000-08-28Paper
Security arguments for digital signatures and blind signatures
Journal of Cryptology
2000-08-08Paper
scientific article; zbMATH DE number 1440054 (Why is no real title available?)
 
2000-05-07Paper
scientific article; zbMATH DE number 1440063 (Why is no real title available?)
 
2000-05-07Paper
scientific article; zbMATH DE number 1304075 (Why is no real title available?)
 
2000-04-09Paper
scientific article; zbMATH DE number 1303137 (Why is no real title available?)
 
1999-06-17Paper
scientific article; zbMATH DE number 1302836 (Why is no real title available?)
 
1999-06-17Paper
scientific article; zbMATH DE number 1304109 (Why is no real title available?)
 
1999-06-17Paper


Research outcomes over time


This page was built for person: David Pointcheval